Vendors

Technology Partners

Aligning with other industry innovators and leaders
By working with other industry innovators and leaders, we bring more advanced threat, vulnerability and compliance management to the market to better serve business needs. Our technology partnerships augment the broad portfolio of security services SMSAM delivers to help businesses fight cybercrime, protect data and reduce security risk.

Arbor Networks

Arbor Networks secures the world’s most demanding and complex networks from DDoS attacks and advanced threats. Arbor Networks customers gain a micro view of their own network, through our suite of products, combined with a macro view of global Internet traffic and emerging threats, through our ATLAS threat intelligence infrastructure. See, understand and solve more security threats with Arbor Networks.

LogRhythm

LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint monitoring, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.

ForeScout Technologies

ForeScout CounterACT® sees desktops, laptops, tablets, smartphones, IoT endpoints, peripherals and rogue devices the instant they connect to your network—even if they don’t have security agents installed. It discovers servers, routers and access points, too. CounterACT gathers in-depth insights about device types, users, applications, operating systems and more. Then it continuously monitors the devices. No agents. No excuses. No kidding.

Gigamon

Gigamon provides active visibility. Having the industry’s first Security Delivery Platform, GigaSECURE®, and the Visibility Fabric™, an intelligent architecture for enterprises, data centers and service providers around the globe, Gigamon’s technology empowers security and infrastructure architects, managers and operators with pervasive and dynamic intelligent visibility of traffic across both physical and virtual environments without affecting the performance of the production network

Extrahop

ExtraHop is a stream analytics platform that provides the fastest, richest, most complete visibility into all activity in your IT infrastructure. The ExtraHop platform turns unstructured network data into structured wire data, and runs real-time analytics on it, so you get critical information the instant you need it.

Positive Technologies

A leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection. Commitment to clients and research has earned us a reputation as one of the foremost authorities on Industrial Control System, Banking, Telecom, Web Application, and ERP security, supported by recognition from the analyst community

iBoss

We provide solutions that protect thousands of enterprises, service providers and government networks against a new age of cyber-threats. Our game-changing Secure Web Gateway Platform with innovative architecture is backed by over 75 patents and patents pending, and chosen by over 4000 enterprises worldwide to increase their security postures. This has made iboss one of the fastest growing cybersecurity companies in the market.

ProofPoint

A next-generation cybersecurity company protecting people, data, and brands from advanced threats and compliance risks. Proofpoint protects your people, data and brand against advanced threats and compliance risks. Built on the cloud and the world’s most advanced intelligence platform, our solutions help you effectively detect and block targeted attacks and respond quickly to suspected compromises.

LightCyber

LightCyber Magna accurately and efficiently detects active attacks regardless of malware status (known or unknown) or attacker techniques – which may include use of no malware at all – to reduce attacker dwell time and minimize the damage done.

LightCyber

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available. Leveraging pre-built connectors and Policy Federation, we can automatically protect more files faster than anyone.

IXIA COM

At Ixia, we deliver a powerful combination of innovative solutions and trusted insight to support your network and security products, from concept to operation. Whether you are preparing your product for launch, deploying an application, or managing a product in operation, we offer an extensive array of solutions in testing, visibility, and security—all in one place.

Thycotic

Delivering innovative Enterprise Privileged Password Protection combined with proven Endpoint Security and Application Control for Windows and Unix. Unlike any other security offering, Thycotic solutions assure the protection and control of your privileged accounts while being the fastest to deploy, easiest to use, scalable enterprise-class solution offered.

Data Sunrise

DataSunrise is an innovative software company dedicated to delivering data security products. Our company was founded by a talented team with strong background in enterprise security, data protection and database management systems.

DUO Security

A worldwide leader in secure access for companies of all sizes. Duo Security protects organizations against data breaches by ensuring only legitimate users and appropriate devices have access to sensitive data and applications - anytime, anywhere.

Certes Networks

Certes Networks’ solutions safeguard enterprise data communications to ensure privacy compliance and block the top data breach attack vectors. Banks, financial institutions, healthcare organizations, governments and other companies in nearly 100 countries rely on Certes’ security and compliance solutions to protect their sensitive networked applications.

Barracuda

Barracuda Networks, Inc. offers industry-leading solutions designed to solve mainstream IT problems – efficiently and cost effectively – while maintaining a level of customer support and satisfaction second to none. Our products span three distinct markets, including: 1) content security, 2) networking and application delivery and 3) data storage, protection and disaster recovery.

CrowdStrike

CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus, endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent. The CrowdStrike Falcon™ platform, certified to replace legacy antivirus, has reinvented how endpoint security is delivered with its industry-leading, cloud native architecture.

GTB Technologies

GTB Technologies is the only Data Protection / Data Loss Prevention solution (on-premises, off-premises and everywhere in between including the cloud) which can prevent the loss of data from Malware, Frenemies and trusted insiders by blocking sensitive data (structured or unstructured) regardless of file type, port or channel, in real-time with impeccable accuracy thus providing true cyber security and insider threat defense whether it be on premise, off premise, in the cloud or as a managed service.

Menlo Security

We believe that everyone should be able to enjoy the benefits of the Internet without the fear of risk or compromise. So we founded Menlo Security to eliminate the threat of malware from the web and email.

Demisto

Demisto Enterprise delivers a complete solution that helps Tier-1 through Tier-3 analysts and SOC managers to optimize the entire incident life cycle while auto documenting and journaling all the evidence. More than 100+ integrations enable security orchestration workflows for incident management and other critical security operation tasks.

ProtectWise

ProtectWise shifts network security to the cloud to provide complete visibility and detection of enterprise threats and accelerated incident response. By harnessing the power of the cloud, the ProtectWise Grid™ has the unique ability to create an unlimited retention window with full-fidelity forensics, automated retrospection and advanced visualization — all with the ease and cost-savings of an on-demand deployment model.

Javalin Networks

avelin AD|Protect is an agentless, artificial intelligence platform that actively and autonomously monitors, alerts, and stops intruders from penetrating the domain environment. It presents the intruder with a false perception of the internal topology and Active Directory, which masks the real environment and prevent attackers from moving off of that one compromised machine.